SYSTEMS, METHODS, AND DEVICES FOR SMART MAPPING AND VPN POLICY ENFORCEMENT
    12.
    发明申请
    SYSTEMS, METHODS, AND DEVICES FOR SMART MAPPING AND VPN POLICY ENFORCEMENT 审中-公开
    用于智能映射和VPN策略执行的系统,方法和设备

    公开(公告)号:US20170026417A1

    公开(公告)日:2017-01-26

    申请号:US15217154

    申请日:2016-07-22

    Abstract: Aspects of the embodiments are directed to systems, methods, and computer program products to program, via a northbound interface, a mapping between an endpoint identifier (EID) and a routing locator (RLOC) directly into a mapping database at a mapping system; receive, from a first tunneling router associated with a first virtual network, a mapping request to a second virtual network, the first router compliant with a Locator/ID Separation Protocol, the mapping request comprising an EID tuple that includes a source identifier and a destination identifier; identify an RLOC based, at least in part, on the destination identifier of the EID tuple from the mapping database; and transmit the RLOC to the first tunneling router implementing an high level policy that has been dynamically resolved into a state of the mapping database.

    Abstract translation: 实施例的方面涉及通过北向接口将端点标识符(EID)和路由定位器(RLOC)之间的映射直接编程到映射系统的映射数据库中的系统,方法和计算机程序产品; 从与第一虚拟网络相关联的第一隧道路由器接收对第二虚拟网络的映射请求,所述第一路由器符合定位符/ ID分离协议,所述映射请求包括包含源标识符和目的地的EID元组 标识符 至少部分地基于来自映射数据库的EID元组的目的地标识符来识别RLOC; 并将RLOC发送到实现已经被动态地解析成映射数据库的状态的高级策略的第一隧道路由器。

    VALIDATING A DEVICE CLASS CLAIM USING MACHINE LEARNING

    公开(公告)号:US20210297454A1

    公开(公告)日:2021-09-23

    申请号:US17330641

    申请日:2021-05-26

    Abstract: In one embodiment, a device in a network receives an access policy and a class behavioral model for a node in the network that are associated with a class asserted by the node. The device applies the access policy and class behavioral model to traffic associated with the node. The device identifies a deviation in a behavior of the node from the class behavioral model, based on the application of the class behavioral model to the traffic associated with the node. The device causes performance of a mitigation action in the network based on the identified deviation in the behavior of the node from the class behavioral model.

    Validating a device class claim using machine learning

    公开(公告)号:US11038893B2

    公开(公告)日:2021-06-15

    申请号:US15595016

    申请日:2017-05-15

    Abstract: In one embodiment, a device in a network receives an access policy and a class behavioral model for a node in the network that are associated with a class asserted by the node. The device applies the access policy and class behavioral model to traffic associated with the node. The device identifies a deviation in a behavior of the node from the class behavioral model, based on the application of the class behavioral model to the traffic associated with the node. The device causes performance of a mitigation action in the network based on the identified deviation in the behavior of the node from the class behavioral model.

    ZERO-TOUCH IOT DEVICE PROVISIONING
    18.
    发明申请

    公开(公告)号:US20180316673A1

    公开(公告)日:2018-11-01

    申请号:US15582113

    申请日:2017-04-28

    CPC classification number: H04L63/0892 H04L63/166 H04L63/20

    Abstract: In one embodiment, an authorized signing authority server receives an authenticity request from a security registrar to vouch for authenticity of a particular device. Based on receiving the authenticity request, the authorized signing authority server may then determine an authenticity state of the particular device, and may also request a device provisioning file for the particular device from a device provisioning server, the device provisioning file defining one or more network security policies for the particular device. Upon receiving the device provisioning file from the device provisioning server, the authorized signing authority server may then return the authenticity state and the device provisioning file for the particular device to the security registrar, causing the security registrar to complete authentication of the particular device based on the authenticity state and the device provisioning file.

    Authenticated group context in transitive IP network domains

    公开(公告)号:US10104050B2

    公开(公告)日:2018-10-16

    申请号:US15146695

    申请日:2016-05-04

    Abstract: A method is provided in one example embodiment and includes receiving at a node of a transitive IP network a data packet including a Network Services Header (“NSH”); accessing by the transitive IP network node context contained in the NSH, wherein the context may be used by the transitive IP network node to perform an enhanced network service in connection with the received data packet; performing by the transitive IP network node the enhanced network service in connection with the received data packet using the accessed context; and, subsequent to the performing, forwarding the received packet to a next node.

Patent Agency Ranking